Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors

Full metadata record
DC Field Value Language
dc.contributor.authorOh, Hyunyoung-
dc.contributor.authorCho, Yeongpil-
dc.contributor.authorPaek, Yunheung-
dc.date.accessioned2022-07-06T16:29:59Z-
dc.date.available2022-07-06T16:29:59Z-
dc.date.created2021-05-11-
dc.date.issued2021-07-
dc.identifier.issn0920-8542-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/141590-
dc.description.abstractIn recent years, there is a growing need to protect security and privacy of the data against various attacks on software running on smart mobile devices. As of today, the code-reuse attack (CRA) is known as one of the most sophisticated techniques. We in this paper propose a hardware-assisted solution that can be practically deployed into the existing ARM-based mobile devices. We exploit CoreSight debug interface to obtain the core internal information. As the information fed from the debug interface is insufficient for our purpose to detect CRAs, our solution uses the metadata to supplement the lacking information. However, most metadata-driven approaches suffer from the significant storage overhead to store every basic information describing the original data that is vital to their analysis or techniques. As this large space overhead can be a major obstacle to the general acceptance of our solution in ARM-based devices with strict performance constraints, we have endeavored to develop a technique minimizing the memory overhead. Also, we have extended our solution to apply to multiprocessor SoCs as the growing number of computing systems including mobile devices use multiprocessor architectures. Experimental results show that our solution detects CRAs with 1.74% performance overhead in dual-CPU system and requires only 5.66% more memories for storing metadata.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleA metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors-
dc.typeArticle-
dc.contributor.affiliatedAuthorCho, Yeongpil-
dc.identifier.doi10.1007/s11227-020-03542-1-
dc.identifier.scopusid2-s2.0-85098966501-
dc.identifier.wosid000604854100010-
dc.identifier.bibliographicCitationJOURNAL OF SUPERCOMPUTING, v.77, no.7, pp.7287 - 7314-
dc.relation.isPartOfJOURNAL OF SUPERCOMPUTING-
dc.citation.titleJOURNAL OF SUPERCOMPUTING-
dc.citation.volume77-
dc.citation.number7-
dc.citation.startPage7287-
dc.citation.endPage7314-
dc.type.rimsART-
dc.type.docTypeArticle; Early Access-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusARCHITECTURE-
dc.subject.keywordPlusPROTECTION-
dc.subject.keywordAuthorSecurity of ARM-based device-
dc.subject.keywordAuthorCode-reuse attack-
dc.subject.keywordAuthorReturn-oriented programming-
dc.subject.keywordAuthorJump-oriented programming-
dc.subject.keywordAuthorMetadata-
dc.identifier.urlhttps://link.springer.com/article/10.1007/s11227-020-03542-1-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Cho, Yeong pil photo

Cho, Yeong pil
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE